Blockchain-Based Certificate-Free Cross-Domain Authentication Mechanism for Industrial Internet
In Industrial Internet, mutual authentication between enterprises is a prerequisite for
establishing reliable upstream and downstream relationships. Existing authentication …
establishing reliable upstream and downstream relationships. Existing authentication …
[HTML][HTML] A novel formal logic for formal analysis of timeliness in non-repudiation protocols
K Yang, M Xiao, X Zhong, Y Zhong - … of King Saud University-Computer and …, 2023 - Elsevier
Non-repudiation protocols are aimed at exchanging digital messages and irrefutable
receipts between two mistrusting parties over the Internet, which form the cornerstones of …
receipts between two mistrusting parties over the Internet, which form the cornerstones of …
Efficient mobile RFID authentication protocol for smart logistics targets tracking
C Xu, W Wei, S Zheng - IEEE Access, 2023 - ieeexplore.ieee.org
Target tracking is one of the problems existing in the supply chain management. The use of
radio frequency identification (RFID) in target tracking helps improve the monitoring …
radio frequency identification (RFID) in target tracking helps improve the monitoring …
Methodology of Testing the Security of Cryptographic Protocols Using the CMMTree Framework
J Piątkowski, S Szymoniak - Applied Sciences, 2023 - mdpi.com
Internet communication is one of the significant aspects of modern civilization. People use
banking, health, social, or shopping platforms and send a lot of data. Each communication …
banking, health, social, or shopping platforms and send a lot of data. Each communication …
LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks
Wireless body area networks (WBANs) have been deployed in numerous applications,
where the most common communication technology is Bluetooth. Bluetooth uses the …
where the most common communication technology is Bluetooth. Bluetooth uses the …
Introduction to Formal Methods for the Analysis and Design of Cryptographic Protocols
This chapter introduces formal methods, and how they are applied to cryptographic
protocols to achieve high security assurance. Cryptographic protocols are communication …
protocols to achieve high security assurance. Cryptographic protocols are communication …